Security, Introduction, Chapter 1 – Rockwell Automation Logix5000 Controllers Security Programming Manual User Manual

Page 9

Advertising
background image

Chapter 1

Security

This chapter discusses security related features available in the Logix Designer

application.

In version 20 or later of the application, security enhancements provide:

• Security Server Validation—When enabled, and a user attempts to access a

secured controller or project file, the application makes sure that the user is

authorized by a FactoryTalk Directory trusted by that controller or project

file. For more information, refer to

Securing a Logix Designer application

project file

on

page 14

.

• Change Detection—Two new Controller attributes were added:

ChangesToDetect and AuditValue. You can configure these attributes

programmatically or by using the Security tab found in the Controller
Properties
dialog box. You can monitor the audit value from an HMI,

historian, remote controller, and from Logix Designer application. For more

information about Change Detection, see

Logix5000 Controllers

Information and Status Programming Guide

, publication

1756-PM015

.

• Restricted communications through trusted slots—When enabled,

ControlLogix controllers only accept communications through selected

slots. For more information about trusted slots, refer to

Securing a Logix

Designer application project file

on

page 14

.

The Logix platform, version 18 or later, provides Data Access Control through
two new tag attributes: External Access and Constant. Together, these attributes

let you control access to tag data and help to safeguard tags by preventing

unwanted changes to their values. For more information about Data Access

Control, see the

Logix5000 Controllers I/O and Tag Data Programming Guide

,

publication

1756-PM004

.

Introduction

Rockwell Automation Publication 1756-PM016G-EN-P - October 2014

9

Advertising